A partial Onion Proxy implementation that's designed to build single-hop circuits through Tor exit nodes
☆146Sep 8, 2015Updated 10 years ago
Alternatives and similar repositories for tortunnel
Users that are interested in tortunnel are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool (and library) for TACKs☆31Jun 15, 2017Updated 8 years ago
- A tool for automated MITM attacks on SSL connections.☆570Dec 17, 2017Updated 8 years ago
- A simple, secure, and stealthy port knocking implementation that does not use libpcap or bind to a socket interface.☆690Oct 19, 2018Updated 7 years ago
- Viewer for Observing Multiple Computers using VNC☆19Feb 13, 2010Updated 16 years ago
- ☆383Sep 22, 2012Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- "><script>prompt(1)</script>''"><!--<svg>☆18Nov 20, 2015Updated 10 years ago
- Clone of Metasploit's wiki w/ additions☆17Nov 22, 2015Updated 10 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆2,040May 29, 2021Updated 4 years ago
- An agile, distributed, and secure alternative to the Certificate Authority system.☆635Mar 7, 2012Updated 14 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13May 5, 2016Updated 9 years ago
- Things I've coded, or use (cause I can't find them online anymore)☆32May 25, 2012Updated 13 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- Help recover passwords / etc. that were incorrectly entered with a typo☆13Jan 24, 2017Updated 9 years ago
- Modules, Scripts, Plugins for the Metasploit Framework☆20May 29, 2011Updated 14 years ago
- Simple shellcode decoder using unicorn-engine☆100Oct 17, 2015Updated 10 years ago
- A fast and modular scanner for Tor exit relays. The canonical repository (including issue tracker) is at https://gitlab.torproject.org/tp…☆460Oct 16, 2023Updated 2 years ago
- A video-sharing web platform compatible with NextShare, a peer-to-peer streaming technology developed within European project P2P-Next☆15Nov 13, 2012Updated 13 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- mixminion is the main implementation of the Type III ("Mixminion") remailer protocol.☆64Jul 17, 2012Updated 13 years ago
- Custom stagers with python encrypting proxy☆40May 25, 2015Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Infecting PE☆25Mar 10, 2014Updated 12 years ago
- ☆13May 4, 2014Updated 11 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Jan 27, 2015Updated 11 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Library to parse and load EXIF (JPEG) image files and meta data, and redact the images for privacy.☆17Mar 31, 2012Updated 13 years ago
- Snarf man-in-the-middle / relay suite☆206Oct 7, 2016Updated 9 years ago
- NOISE creates "real-looking" text based upon a collection of reference texts, which can then be used in emails, tweets, web searches, IRC…☆15Apr 7, 2015Updated 10 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 13 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- Shellscript opens multiple TOR instances☆107Dec 7, 2020Updated 5 years ago
- Modified version of Tor and associated tools for investigating the Hidden Service DHT. This research is old. Lots of work is being done t…☆11Oct 5, 2015Updated 10 years ago
- PowerDNS: Powershell DNS Delivery☆216Sep 26, 2018Updated 7 years ago
- Python bindings for Intel's XED☆33Jul 1, 2024Updated last year
- Access My Info Frontend☆12Oct 16, 2019Updated 6 years ago